Description
A flaw has been found in UsamaK98 python-notebook-mcp up to a05a232815809a7e425b5fa7be26e0d4369894c2. Impacted is the function create_notebook/read_notebook/edit_cell/add_cell of the file server.py. This manipulation causes path traversal. It is possible to initiate the attack remotely. The exploit has been published and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.
Problem types
Product status
Timeline
| 2026-05-04: | Advisory disclosed |
| 2026-05-04: | VulDB entry created |
| 2026-05-04: | VulDB entry last update |
Credits
CPT_Penner (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/361070 (VDB-361070 | UsamaK98 python-notebook-mcp server.py add_cell path traversal)
vuldb.com/vuln/361070/cti (VDB-361070 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/807748 (Submit #807748 | UsamaK98 python-notebook-mcp a05a232815809a7e425b5fa7be26e0d4369894c2 Path Traversal)
github.com/UsamaK98/python-notebook-mcp/issues/5
github.com/UsamaK98/python-notebook-mcp/